Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > A+ > 220-1102

220-1102 CompTIA A+ Certification Core 2 Exam Question and Answers

Question # 4

A company wants to take advantage of modern technology and transition away from face-to-face meetings. Which of the following types of software would benefit the company the most? (Select two).

A.

Videoconferencing

B.

File transfer

C.

Screen-sharing

D.

Financial

E.

Remote access

F.

Record-keeping

Full Access
Question # 5

An administrator needs to back up the following components of a single workstation:

•The installation of the operating system

•Applications

•User profiles

•System settings

Which of the following backup methods can the administrator use to ensure the workstation is properly backed up?

A.

Differential

B.

Image

C.

Synthetic

D.

Archive

Full Access
Question # 6

A technician needs to upgrade a legacy system running on a 32-bit OS with new applications that can work both on a 32-bit and a 64-bit system. The legacy system is critically important to the organization. The IT manager cautions that the new applications must not have a detrimental effect on company finances. Which of the following impacts is the IT manager most concerned with?

A.

Device

B.

Business

C.

Network

D.

Operation

Full Access
Question # 7

A user reports receiving constant, unwanted pop-ups and being unable to close the browser window. These issues have impacted the user's productivity and may have caused the user's files to be altered. Which of the following should a technician do to address these issues with minimal impact to the user?

A.

Use System Restore to recover the OS files.

B.

Wipe the computer and install a new copy of the OS.

C.

Identify whether the disk partition table has been reduced in size.

D.

Perform a full-system, antivirus scan and check browser notifications.

Full Access
Question # 8

A technician wants to securely dispose of storage drives. Which of the following is the best way to eliminate data on SSDs?

A.

Degaussing

B.

Shredding

C.

Erasing

D.

Drilling

Full Access
Question # 9

A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?

A.

Disk Defragment

B.

Registry Editor

C.

System Information

D.

Disk Cleanup

Full Access
Question # 10

A technician is setting up a network printer for a customer who has a SOHO router. The technician wants to make sure the printer stays connected in the future and is available on all the computers in the house. Which of the following should the technician configure on the printer?

A.

DNS settings

B.

Static IP

C.

WWAN

D.

Meteredconnection

Full Access
Question # 11

A technician is troubleshooting a Windows 10 PC that has experienced a BSOD. The user recently installed optional Windows updates. Which of the following is best way to resolve the issue?

A.

Enable System Restore.

B.

Roll back the device drivers.

C.

Reinstall the OS.

D.

Update the BIOS.

Full Access
Question # 12

Which of the following Linux commands would help to identify which directory the user is currently operating in?

A.

pwd

B.

dig

C.

find

D.

cat

Full Access
Question # 13

A company using Active Directory wants to change the location of all users' "Documents" to a file server on the network. Which of the following should the company set up to accomplish this task?

A.

Security groups

B.

Folder redirection

C.

Organizational unit structure

D.

Access control list

Full Access
Question # 14

A user opened an infected email. A security administrator responded to the malicious event, successfully mitigated the situation, and returned the machine to service Which of the following needs to be completed before this event is considered closed?

A.

Acceptable use policy

B.

Incident report

C.

End user license agreement

D.

Standard operating procedures

Full Access
Question # 15

A user recently downloaded a free game application on an Android device. The device then began crashing frequently and quickly losing its battery charge. Which of the following should the technician recommend be done first to remediate these issues? (Select two).

A.

Uninstall the game application.

B.

Perform a factory reset of the device.

C.

Connect the device to an external charger.

D.

Install the latest security patches.

E.

Clear the application's cache.

F.

Enable the device's built-in anti-malware protection.

Full Access
Question # 16

A technician is setting up a printer on a Linux workstation. Which of the following commands should the technician use to set the default printer?

A.

ipr

B.

Ispool

C.

Ipstat

D.

Ipoptions

Full Access
Question # 17

A technician needs to update the software on several hundred Mac laptops. Which of the following is the best method to complete the task?

A.

SSH

B.

MDM

C.

RDP

D.

SFTP

Full Access
Question # 18

A customer wants to make sure the data is protected and secure on a Windows laptop's hard drive. Which of the following is the best solution?

A.

Windows Backup

B.

BitLocker

C.

Shadow Copy

D.

Trusted PlatformModule

Full Access
Question # 19

A technician receives a high-priority ticket about sensitive information collected from an end user’s workstation. Which of the following steps should a technician take to preserve the chain of custody for a forensic investigation?

A.

Reimage the workstation.

B.

Inform the user of the investigation.

C.

Recover and secure the workstation.

D.

Back up the workstation

Full Access
Question # 20

A technician is troubleshooting a PC that is unable to perform DNS lookups. Utilizing the following firewall output:

Protocol/PortActionDirection

1 AllowOut

445 BlockOut

53 BlockOut

123 BlockOut

80 BlockOut

Which of the following ports should be opened to allow for DNS recursion?

A.

1

B.

53

C.

80

D.

123

E.

445

Full Access
Question # 21

A technician is configuring a SOHO router and wants to only allow specific computers on the network. Which of the following should the technician do?

A.

Configure MAC filtering.

B.

Disable DHCP.

C.

Configure port forwarding.

D.

Disable guest access.

Full Access
Question # 22

Which of the following features can a technician use to ensure users are following password length requirements?

A.

Group Policy

B.

Log-on script

C.

Access controllist

D.

Security groups

Full Access
Question # 23

A user submits a request to have a graphics application installed on a desktop When the technician attempts to install the application, the installation fails and the error message "Not compatible with OS' is displayed. Which of the following is the most likely reason for this error message?

A.

Thegraphics card driver needs to beupdated

B.

Theapplication installer is 64-bit.

C.

Theinstallation requires administrative rights.

D.

Thedisk space is inadequate.

Full Access
Question # 24

A user reports that an Android mobile device takes a long time to boot, and all applications crash when launched. The user installed the applications from a third-party website. Which of the following steps should the technician complete to diagnose the issue?

A.

Scan the system for malware.

B.

Clear the web browser cache.

C.

Enroll the device in an MDM system.

D.

Confirm the compatibility of the applications with the OS.

Full Access
Question # 25

A user wants to back up a device's OS and data. Which of the following is the best way to accomplish this task?

A.

Incremental backup

B.

System image

C.

System restore point

D.

Differential backup

Full Access
Question # 26

Users report having difficulty using the Windows Hello facial recognition feature. Which of the following is a secondary feature of Windows Hello that can be used to log in?

A.

Personal identification number

B.

Username/password

C.

One-time-use token

D.

Cryptographic device

Full Access
Question # 27

A user received an alert from a Windows computer indicating low storage space. Which of the following will best resolve this issue?

A.

Reviewing System Information

B.

Running Disk Cleanup

C.

Editing the Registry

D.

Checking the Performance Monitor

E.

Increasing the memory

Full Access
Question # 28

Which of the following is the best reason for sandbox testing in change management?

    To evaluate the change before deployment

A.

To obtain end-user acceptance

B.

To determine the affected systems

C.

To select a change owner

Full Access
Question # 29

A user is experiencing the following issues with Bluetooth on a smartphone:

•The user cannot hear any sound from a speaker paired with the smartphone.

•The user is having issues synchronizing data from their smart watch, which is also connected via Bluetooth.

A technician checked the Bluetooth settings, confirmed it is successfully paired with a speaker, and adjusted the volume levels, but still could not hear anything. Which of the following steps should the technician take next to troubleshoot the Bluetooth issues?

A.

Restart the smartphone.

B.

Reset the network settings.

C.

Unpair the Bluetooth speaker.

D.

Check for system updates.

Full Access
Question # 30

A technician is setting up a new PC in a SOHO. Which of the following should the technician most likely configure on the PC?

A.

VDI

B.

Mapped drives

C.

Wireless WAN

D.

Domain

Full Access
Question # 31

A user recently purchased a second monitor and wants to extend the Windows desktop to the new screen. Which of the following Control Panel options should a technician adjust to help the user?

    Color Management

A.

System

B.

Troubleshooting

C.

Device Manager

D.

Administrative Tools

Full Access
Question # 32

A technician needs to replace a PC's motherboard. The technician shuts down the PC. Which of the following steps should the technician take next?

A.

Turn off the monitor.

B.

Remove the power cord.

C.

Remove the PSU.

D.

Remove the RAM modules.

Full Access
Question # 33

A user's computer unexpectedly shut down immediately after the user plugged in a USB headset. Once the user turned the computer back on, everything was functioning properly, including the headset. Which of the following Microsoft tools would most likely be used to determine the root cause?

A.

Event Viewer

B.

System Configuration

C.

Device Manager

D.

Performance Monitor

Full Access
Question # 34

A technician has verified that a user's computer has a virus and the antivirus software is out of date. Which of the following steps should the technician take next?

A.

Quarantine the computer.

B.

Use a previous restore point.

C.

Educate the end user about viruses.

D.

Download the latest virus definitions.

Full Access
Question # 35

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?

A.

To maintain an information security policy

B.

To properly identify the issue

C.

To control evidence and maintain integrity

D.

To gather as much information as possible

Full Access
Question # 36

Which of the following protocols supports fast roaming between networks?

A.

WEP

B.

WPA

C.

WPA2

D.

LEAP

E.

PEAP

Full Access
Question # 37

A developer reports that a workstation's database file extensions have been changed from .db to .enc. The developer is also unable to open the database files manually. Which of the following is the best option for recovering the data?

    Accessing a restore point

A.

Rebooting into safe mode

B.

Utilizing the backups

C.

Using an AV to scan the affected files

Full Access
Question # 38

Which of the following languages is used for scripting the creation of Active Directory accounts?

A.

Bash

B.

SQL

C.

PHP

D.

PowerShell

Full Access
Question # 39

A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?

A.

Date and time

B.

User access control

C.

UEFI boot mode

D.

Log-on times

Full Access
Question # 40

An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?

A.

Risk analysis

B.

Sandbox testing

C.

End user acceptance

D.

Lessons learned

Full Access
Question # 41

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

    Run an antivirus and enable encryption.

A.

Restore the defaults and reimage the corporate OS.

B.

Back up the files and do a system restore.

C.

Undo the jailbreak and enable an antivirus.

Full Access
Question # 42

A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?

A.

Educate the end user on best practices for security.

B.

Quarantine the host in the antivirus system.

C.

Investigate how the system was infected with malware.

D.

Create a system restore point.

Full Access
Question # 43

A user's antivirus software reports an infection that it is unable to remove. Which of the following is the most appropriate way to remediate the issue?

A.

Disable System Restore.

B.

Utilize a Linux live disc.

C.

Quarantine the infected system.

D.

Update the anti-malware.

Full Access
Question # 44

A customer calls desktop support and begins yelling at a technician. The customer claims to have submitted a support ticket two hours ago and complains that the issue still has not been resolved. Which of the following describes how the technician should respond?

    Place the customer on hold until the customer calms down.

A.

Disconnect the call to avoid a confrontation.

B.

Wait until the customer is done speaking and offer assistance.

C.

Escalate the issue to a supervisor.

Full Access
Question # 45

Which of the following file types allows a user to easily uninstall software from macOS by simply placing it in the trash bin?

    .exe

A.

.dmg

B.

. app

C.

. rpm

D.

.pkg

Full Access
Question # 46

When visiting a particular website, a user receives a message stating, "Your connection is not private." Which of the following describes this issue?

A.

Certificate warning

B.

Malware

C.

JavaScript error

D.

Missing OS update

Full Access
Question # 47

A management team at a small office wants to block access to inappropriate websites and create a log of these access attempts. Which of the following is a way to meet these requirements?

A.

Content filter

B.

Screened subnet

C.

Port forwarding

D.

Access control list

Full Access
Question # 48

A technician cannot uninstall a system driver because the driver is currently in use. Which of the following tools should the technician use to help uninstall the driver?

A.

msinfo32.exe

B.

dxdiag.exe

C.

msconfig.exe

D.

regedit.exe

Full Access
Question # 49

A technician wants to mitigate unauthorized data access if a computer is lost or stolen. Which of the following features should the technician enable?

A.

Network share

B.

Group Policy

C.

BitLocker

D.

Static IP

Full Access
Question # 50

Which of the following is the best way to limit the loss of confidential data if an employee's company smartphone is lost or stolen?

A.

Installing a VPN

B.

Implementing location tracking

C.

Configuring remote wipe

D.

Enabling backups

Full Access
Question # 51

A systems administrator is troubleshooting network performance issues in a large corporate office. The end users report that traffic to certain internal environments is not stable and often drops. Which of the following command-line tools can provide the most detailed information for investigating the issue further?

A.

ipconfig

B.

arp

C.

nslookup

D.

pathping

Full Access
Question # 52

A network technician is deploying a new machine in a small branch office that does not have a DHCP server. The new machine automatically receives the IP address of 169.254.0.2 and is unable to communicate with the rest of the network. Which of the following would restore communication?

    Static entry

A.

ARP table

B.

APIPA address

C.

NTP specification

Full Access
Question # 53

Which of the following commands can a technician use to get the MAC address of a Linux distribution?

    net use

A.

ifconfig

B.

netstat

C.

ping

Full Access
Question # 54

Which of the following operating systems would most likely be used to run the inventory management system at a factory?

A.

Windows

B.

Chrome OS

C.

Android

D.

iOS

Full Access
Question # 55

Which of the following are mobile operating systems used on smartphones? (Select two).

A.

macOS

B.

Windows

C.

Chrome OS

D.

Linux

E.

iOS

F.

Android

Full Access
Question # 56

Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in?

A.

.bat

B.

.dll

C.

.ps1

D.

.txt

Full Access
Question # 57

A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the company LAN. The security administrator asks the technician to utilize a single software solution that does not require an external internet connection. Which of the following remote access tools is the technician most likely to install?

A.

VNC

B.

RMM

C.

RDP

D.

SSH

Full Access
Question # 58

Which of the following file extensions should a technician use for a PowerShell script?

A.

.ps1

B.

.py

C.

.sh

D.

.bat

E.

.cmd

Full Access
Question # 59

A technician wants to install Developer Mode on a Windows laptop but is receiving a "failed to install package" message. Which of the following should the technician do first?

A.

Ensure internet connectivity.

B.

Check for Windows updates.

C.

Enable SSH.

D.

Reboot computer.

Full Access
Question # 60

Which of the following is the most likely reason a filtration system is critical for data centers?

A.

Plastics degrade over time.

B.

High humidity levels can rust metal.

C.

Insects can invade the data center.

D.

Dust particles can clog the machines.

Full Access
Question # 61

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed first to prevent further damage to the host and other systems?

    Turn off the machine.

A.

Run a full antivirus scan.

B.

Remove the LAN card.

C.

Install a different endpoint solution.

Full Access
Question # 62

A help desk technician needs to remotely access and control a customer's Windows PC by using a secure session that allows the technician the same control as the customer. Which of the following tools provides this type of access?

A.

FTP

B.

RDP

C.

SSH

D.

VNC

Full Access
Question # 63

A technician is trying to connect to a user's laptop in order to securely install updates. Given the following information about the laptop:

Which of the following should the technician do to connect via RDP?

A.

Confirm the user can ping the default gateway.

B.

Change the IP address on the user's laptop.

C.

Change the subnet mask on the user's laptop.

D.

Open port 3389 on the Windows firewall.

Full Access
Question # 64

A technician is creating a location on a Windows workstation for a customer to store meeting minutes. Which of the following commands should the technician use?

A.

c: \minutes

B.

dir

C.

rmdir

D.

md

Full Access
Question # 65

A technician was assigned a help desk ticket and resolved the issue. Which of the following should the technician update to assist other technicians in resolving similar issues?

A.

End user training

B.

Progress notes

C.

Knowledge base

D.

Acceptable use policy document

Full Access
Question # 66

Which of the following script types is used with the Python language by default?

A.

.ps1

B.

.vbs

C.

.bat

D.

.py

Full Access
Question # 67

A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk?

A.

Requiring employees to enter their usernames and passwords

B.

Setting up facial recognition for each employee

C.

Using a PIN and providing it to employees

D.

Requiring employees to use their fingerprints

Full Access
Question # 68

A technician, who is working at a local office, has found multiple copies of home edition software installed on computers. Which of the following does this MOST likely violate?

A.

EULA

B.

Pll

C.

DRM

D.

Open-source agreement

Full Access
Question # 69

Which of the following is the default GUI and file manager in macOS?

A.

Disk Utility

B.

Finder

C.

Dock

D.

FileVault

Full Access
Question # 70

Which of the following is used to explain issues that may occur during a change implementation?

A.

Scope change

B.

End-user acceptance

C.

Risk analysis

D.

Rollback plan

Full Access
Question # 71

A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue. Which of the following tools should the technician use to make adjustments?

A.

eventvwr.msc

B.

perfmon.msc

C.

gpedic.msc

D.

devmgmt.msc

Full Access
Question # 72

A user calls the help desk to report that mapped drives are no longer accessible. The technician verifies that clicking on any of the drives on the user's machine results in an error message. Other users in the office are not having any issues. As a first step, the technician would like to remove and attempt to reconnect the drives. Which of the following command-line tools should the technician use?

A.

net use

B.

set

C.

mkdir

D.

rename

Full Access
Question # 73

A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).

A.

Standard formatting

B.

Drilling

C.

Erasing

D.

Recycling

E.

Incinerating

F.

Low-level formatting

Full Access
Question # 74

A user is no longer able to start the OS on a computer and receives an error message indicating there is no OS found. A technician reviews the audit logs and notes that the user's system posted a S.M.A.R.T. error just days before this issue. Which of the following is the MOST likely cause of this issue?

A.

Boot order

B.

Malware

C.

Drive failure

D.

Windows updates

Full Access
Question # 75

A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?

A.

System

B.

Indexing Options

C.

Device Manager

D.

Programs and Features

Full Access
Question # 76

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

A.

Delete the application's cache.

B.

Check for application updates.

C.

Roll back the OS update.

D.

Uninstall and reinstall the application.

Full Access
Question # 77

A technician needs to add an individual as a local administrator on a Windows home PC. Which of the following utilities would the technician MOST likely use?

A.

Settings > Personalization

B.

Control Panel > Credential Manager

C.

Settings > Accounts > Family and Other Users

D.

Control Panel > Network and Sharing Center

Full Access
Question # 78

A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Although the connection is unsuccessful, the technician is able to ping the computer successfully. Which of the following is MOST likely preventing the connection?

A.

The Windows 10 desktop has Windows 10 Home installed.

B.

The Windows 10 desktop does not have DHCP configured.

C.

The Windows 10 desktop is connected via Wi-Fi.

D.

The Windows 10 desktop is hibernating.

Full Access
Question # 79

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator MOST likely creating?

A.

Access control list

B.

Acceptable use policy

C.

Incident report

D.

Standard operating procedure

Full Access
Question # 80

A homeowner recently moved and requires a new router for the new ISP to function correctly. The internet service has been installed and has been confirmed as functional. Which of the following is the FIRST step the homeowner should take after installation of all relevant cabling and hardware?

A.

Convert the PC from a DHCP assignment to a static IP address.

B.

Run a speed test to ensure the advertised speeds are met.

C.

Test all network sharing and printing functionality the customer uses.

D.

Change the default passwords on new network devices.

Full Access
Question # 81

A user's corporate phone was stolen, and the device contains company trade secrets. Which of the following technologies should be implemented to mitigate this risk? (Select TWO).

A.

Remote wipe

B.

Firewall

C.

Device encryption

D.

Remote backup

E.

Antivirus

F.

Global Positioning System

Full Access
Question # 82

Which of the following defines the extent of a change?

A.

Scope

B.

Purpose

C.

Analysis

D.

Impact

Full Access
Question # 83

A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?

A.

Spam filter installation

B.

Invalid registry settings

C.

Malware infection

D.

Operating system update

Full Access
Question # 84

A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which programs are starting with the OS but receives a message that it can no longer be used to view startup items. Which of the following programs can the technician use to view startup items?

A.

msinfo32

B.

perfmon

C.

regedit

D.

taskmgr

Full Access
Question # 85

Which of the following editions of Windows 10 requires reactivation every 180 days?

A.

Enterprise

B.

Pro for Workstation

C.

Home

D.

Pro

Full Access
Question # 86

A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Select TWO).

A.

Device drivers

B.

Keyboard backlight settings

C.

Installed application license keys

D.

Display orientation

E.

Target device power supply

F.

Disabling express charging

Full Access
Question # 87

A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?

A.

Recalibrating the magnetometer

B.

Recalibrating the compass

C.

Recalibrating the digitizer

D.

Recalibrating the accelerometer

Full Access
Question # 88

A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize?

A.

DHCP

B.

SMTP

C.

DNS

D.

RDP

Full Access
Question # 89

A company needs employees who work remotely to have secure access to the corporate intranet. Which of the following should the company implement?

A.

Password-protected Wi-Fi

B.

Port forwarding

C.

Virtual private network

D.

Perimeter network

Full Access
Question # 90

A technician needs to transfer a file to a user's workstation. Which of the following would BEST accomplish this task utilizing the workstation's built-in protocols?

A.

VPN

B.

SMB

C.

RMM

D.

MSRA

Full Access
Question # 91

A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user MOST likely be able to make this change?

A.

System

B.

Devices

C.

Personalization

D.

Accessibility

Full Access
Question # 92

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?

A.

Remote Assistance

B.

Remote Desktop Protocol

C.

Screen Sharing

D.

Virtual Network Computing

Full Access
Question # 93

Which of the following often uses an SMS or third-party application as a secondary method to access a system?

A.

MFA

B.

WPA2

C.

AES

D.

RADIUS

Full Access
Question # 94

A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns?

A.

UAC

B.

MDM

C.

LDAP

D.

SSO

Full Access
Question # 95

A BSOD appears on a user's workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause?

A.

Stop code

B.

Event Mewer

C.

Services

D.

System Configuration

Full Access
Question # 96

Which of the following macOS features provides the user with a high-level view of all open windows?

A.

Mission Control

B.

Finder

C.

Multiple Desktops

D.

Spotlight

Full Access
Question # 97

A user requires local administrative access to a workstation. Which of the following Control Panel utilities allows the technician to grant access to the user?

A.

System

B.

Network and Sharing Center

C.

User Accounts

D.

Security and Maintenance

Full Access
Question # 98

A technician needs to provide recommendations about how to upgrade backup solutions for a site in an area that has frequent hurricanes and an unstable power grid. Which of the following should the technician recommend implementing?

A.

High availability

B.

Regionally diverse backups

C.

On-site backups

D.

Incremental backups

Full Access
Question # 99

A user is trying to use a third-party USB adapter but is experiencing connection issues. Which of the following tools should the technician use to resolve this issue?

A.

taskschd.msc

B.

eventvwr.msc

C.

de vmgmt. msc

D.

diskmgmt.msc

Full Access
Question # 100

A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus?

A.

Disable System Restore.

B.

Schedule a malware scan.

C.

Educate the end user.

D.

Run Windows Update.

Full Access
Question # 101

An employee calls the help desk regarding an issue with a laptop PC. After a Windows update, the user can no longer use certain locally attached devices, and a reboot has not fixed the issue. Which of the following should the

technician perform to fix the issue?

A.

Disable the Windows Update service.

B.

Check for updates.

C.

Restore hidden updates.

D.

Rollback updates.

Full Access
Question # 102

A company needs to securely and remotely access network devices. Which of the following will allow the company to access these devices?

A.

Telnet

B.

TKIP

C.

RDP

D.

SSH

Full Access
Question # 103

Which of the following ensures proprietary information on a lost or stolen mobile device cannot be accessed while the device is offline?

A.

Remote wipe

B.

Mandatory screen locks

C.

Location applications

D.

Device data encryption

Full Access
Question # 104

Which of the following is the weakest wireless security protocol?

A.

WEP

B.

WPA2

C.

TKIP

D.

AES

Full Access
Question # 105

An organization's critical database files were attacked with ransomware. The company refuses to pay the ransom for a decryption key. All traces of the infection have been removed from the underlying servers. Which of the following should the company do next?

A.

Scan all of the infected files with up-to-date, anti-malware cleaning software.

B.

Fully patch the server operating systems hosting the fileshares.

C.

Change the files to be read-only.

D.

Restore critical data from backup.

Full Access
Question # 106

A technician is working at a client office site, and the technician’s family member repeatedly calls and texts about a non-emergency situation. Which of the following should the technician do?

A.

Step aside and answer.

B.

Put the phone on silent.

C.

Text a reply.

D.

Ignore the phone and continue working.

Full Access
Question # 107

A user's computer was infected with a Trojan. The user thinks the Trojan was introduced when clicking on a malicious link in an email. Which of the following actions should the technician take to prevent further damage to the computer?

A.

Ensure anti-malware signatures are up to date.

B.

Enable the firewall.

C.

Scan the system with a rootkit scanner.

D.

Review the proxy settings.

Full Access
Question # 108

The following error is displayed on a user's computer screen:

No operating system found

Which of the following is the first troubleshooting step a technician should complete?

A.

Disconnect external storage

B.

Flash the BIOS

C.

Replace the SATA cable

D.

Turn on the device in safe mode

Full Access
Question # 109

A technician ran the following command on a user's workstation:

net use G: \\server1\team\documents /persistent:yes

Which of the following did the technician set up by running this command?

A.

Mapped drive

B.

File server

C.

Shared folder

D.

Shared resource

Full Access
Question # 110

A small company has an office in a multitenant building. The company has implemented a wireless network for its employees to use. However, the network speeds are slow, and many employees have had intermittent access to the Internet. The network consists of a single wireless router with default settings in place. Which of the following should a technician do to improve the network speed and Internet access?

A.

Enable WPA3 security.

B.

Change the wireless channel.

C.

Implement MAC filtering.

D.

Create a guest network.

Full Access
Question # 111

Which of the following techniques is used by a threat actor to obtain information through physical means?

A.

Denial of service

B.

Brute force

C.

Dumpster diving

D.

Evil twin

Full Access
Question # 112

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?

A.

Group Policy

B.

Firewall

C.

Microsoft Management Control

D.

MSConfig

Full Access
Question # 113

After a computer upgrade at an imaging lab. the upgraded computers are not able to obtain an IP address. Which of the following is most likely the issue?

A.

TheswitchIs only providing IPv6 addresses.

B.

TheOS must be updated to be compatible with the imaging software.

C.

Theswitchhas port security enabled.

D.

Theswitchdoes not support multicast traffic.

Full Access
Question # 114

A technician is implementing the latest application security updates for endpoints on an enterprise network. Which of the following solutions should the technician use to ensure device security on the network while adhering to industry best practices?

A.

Automate the patching process.

B.

Monitor the firewall configuration.

C.

Implement access control lists.

D.

Document all changes.

Full Access
Question # 115

A customer reports high data usage on a smartphone that reaches its monthly data limit within the first week of each billing cycle. The customer uses the phone primarily for calls and SMS messages with minimal content streaming. A technician troubleshoots the phone and notices that both developer mode and installs from unknown sources are enabled. Which of the following should the technician check next?

A.

Storage cache

B.

Malicious applications

C.

Privacy settings

D.

Permissions

Full Access
Question # 116

Which of the following should be considered when maintaining the environment of a server room?

A.

Circuit breaker capacity

B.

Power distribution unit placement

C.

RAID configurations

D.

Virtualization

Full Access
Question # 117

A customer needs to verify an executable file that the customer downloaded from a website. Which of the following should the customer use to verify the file?

A.

Password manager

B.

BitLocker

C.

FileVault

D.

Checksum

E.

Secure site

Full Access
Question # 118

A technician is troubleshooting a user's PC that is displaying pop-up windows advertising free software downloads. When the technician tries to open a document, the system displays an error message: "Not enough memory to perform this operation." Which of the following should be the technician's next step to resolve this issue?

A.

Install antispyware

B.

Relmage the system

C.

Disable the pop-up blocker

D.

Upgrade the browser

E.

Install antivirus software

Full Access
Question # 119

A user reports the following issues:

•Their computer is constantly running slowly.

•The default home page of the web browser has changed to a suspicious search engine.

•They have been receiving pop-up ads on the screen.

Which of the following should a technician do first to address these issues?

A.

Update the antivirus program and run a full system scan.

B.

Uninstall the suspicious search engine and reset the home page.

C.

Install the latest updates for the operating system.

D.

Block the pop-up ads using the web browser settings.

Full Access
Question # 120

A company would like to deploy baseline images to new computers as they are started up on the network. Which of the following boot processes should the company use for this task?

A.

ISO

B.

Secure

C.

USB

D.

PXE

Full Access
Question # 121

A user calls the help desk to report an issue with their smartphone. After the user returns from a business trip, the user is no longer able to access email or visit websites without a Wi-Fi connection on the smartphone. Which of the following could the user do to most likely resolve the issue?

A.

Enable cellular data.

B.

Increase data limits.

C.

Disconnect the VPN.

D.

Reinstall the SIM card.

Full Access
Question # 122

Users report that they can log in to the web application during business hours, but none of the application's functions are working properly. Company policy does not allow for the server to be rebooted during business hours. Which of the following should a technician do to fix the web application and follow company policy?

A.

Restart services.

B.

Roll back Windows updates.

C.

Perform a Windows repair.

D.

Add RAM to the server.

Full Access
Question # 123

Which of the following scripting languages is the most commonly used for system administration on Windows operating systems?

A.

PowerShell

B.

Python

C.

Bash

D.

JavaScript

Full Access
Question # 124

Which of the following methods is a way to superficially delete files on a hard drive?

A.

Drilling

B.

Degaussing

C.

Wiping

D.

Shredding

E.

Low-level formatting

Full Access
Question # 125

A technician reports that a SOHO wireless network was compromised by an attacker who brute forced a password to gain access. The attacker was able to modify the DNS settings on the router and spread malware to the entire network. Which of the following configurations would most likely have allowed the attack to take place? (Select two).

A.

Guest network

B.

TKIP

C.

WPS

D.

Default login

E.

WEP

F.

AES

Full Access
Question # 126

Which of the following authentication types is the most secure?

A.

WPA3

B.

WEP

C.

RADIUS

D.

TACACS+

E.

WPS

Full Access
Question # 127

A technician wants to update the local security policies on a Windows machine but is unable to launch the expected snap-in. Which of the following is the most likely reason?

A.

The computer is running Windows Home.

B.

The user did not sign the end user license agreement.

C.

The user disabled the User Account Control.

D.

An antivirus application is blocking access.

Full Access
Question # 128

Which of the following should be used to configure automatic backups on macOS?

A.

Mission Control

B.

Time Machine

C.

Disaster Recovery

D.

System Restore

Full Access
Question # 129

Which of the following environmental effects can be the result of using virtualization?

A.

Greater energy consumption

B.

Noise pollution

C.

Reduced space requirements

D.

Fewer maintenance needs

Full Access
Question # 130

A technician is an administrator on a messaging application for a private work group of mixed departments. One of the technician’s colleagues discloses to the group that their employer recently suffered a major security breach and shared details about the breach to the group Which of the following should the technician do first7

A.

Ignore the messages as all of the group members work for the same employer.

B.

Remove the colleague from the group and ask members to delete the messages.

C.

Message the colleague privately and ask the colleague to delete the messages immediately.

D.

Contact the supervisor and report the colleague with screen shots of the messages

Full Access
Question # 131

A network administrator is showing an email application on a personal cell phone to a coworker. The cell phone is enrolled in the company's MDM program. When launching the application store to download the email application, the coworker receives a security warning stating the device violates company policies due to root-level access. Which of the following should the coworker perform next to resolve the issue?

A.

Download and install a similar application.

B.

Install the latest mobile OS updates.

C.

Reimage the device with the OS from the OEM.

D.

Return the cell phone to the manufacturer.

Full Access
Question # 132

Which of the following file types should be used to install software on a macOS computer? (Select two).

A.

.yum

B.

.pkg

C.

.msi

D.

.ps1

E.

.exe

F.

.dmg

Full Access
Question # 133

After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issue?

A.

Updating the failed software

B.

Registering the smartphone with an MDM solution

C.

Installing a third-party client

D.

Clearing the cache partition

Full Access
Question # 134

A user reports that a new, personally owned tablet will not connect to the corporate Wi-Fi network. The user is able to connect to the Wi-Fi network with other devices, and the tablet is running the latest software. Which of the following is the most likely cause of the issue?

A.

Incorrect encryption settings

B.

Blocked MAC address

C.

Outdated drivers

D.

Disabled location services

Full Access
Question # 135

An administrator needs to copy files to a Linux server at another office location so multiple users can access the files. Which of the following is the best for the administrator to use?

A.

SFTP

B.

RDP

C.

DHCP

D.

RMM

Full Access
Question # 136

A customer's workstation cannot connect to the internet. A technician runs a command on the workstation to view the network settings. The following is a partial readout of the response:

Which of the following is the most likely cause of the issue?

A.

The IP address is incorrect.

B.

The subnet mask is incorrect.

C.

The gateway setting is incorrect.

D.

The DNS servers are incorrect.

E.

The physical address is spoofed.

Full Access
Question # 137

A technician thinks a customer's computer may have a malware infection and wants to determine whether the computer is in communication with any other machines. Which of the following commands should the technician use?

A.

netstat

B.

tracert

C.

net use

D.

net user

E.

nslookup

Full Access
Question # 138

A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received:

The Audio Driver is not running.

Which of the following will MOST likely resolve the issue?

A.

compmgmt.msc

B.

regedit.exe

C.

explorer.exe

D.

taskmgt.exe

E.

gpmc.msc

F.

services.msc

Full Access
Question # 139

A developer's Type 2 hypervisor is performing inadequately when compiling new source code. Which of the following components should the developer upgrade to improve the hypervisor’s performance?

A.

Amount of system RAM

B.

NIC performance

C.

Storage IOPS

D.

Dedicated GPU

Full Access
Question # 140

Which of the following is an advantage of using WPA2 instead of WPA3?

A.

Connection security

B.

Encryption key length

C.

Device compatibility

D.

Offline decryption resistance

Full Access
Question # 141

The battery life on an employee's new phone seems to be drastically less than expected, and the screen stays on for a very long time after the employee sets the phone down. Which of the following should the technician check first to troubleshoot this issue? (Select two).

A.

Screen resolution

B.

Screen zoom

C.

Screen timeout

D.

Screen brightness

E.

Screen damage

F.

Screen motion smoothness

Full Access
Question # 142

A customer calls the help desk asking for instructions on how to modify desktop wallpaper. Which of the following Windows 10 settings should the technician recommend?

A.

Personalization

B.

Apps

C.

Updates

D.

Display

Full Access
Question # 143

Which of the following allows access to the command line in macOS?

A.

PsExec

B.

command.com

C.

Terminal

D.

CMD

Full Access
Question # 144

The screen on a user's mobile device is not autorotating even after the feature has been enabled and the device has been restarted. Which of the following should the technician do next to troubleshoot the issue?

A.

Calibrate the phone sensors.

B.

Enable the touch screen.

C.

Reinstall the operating system.

D.

Replace the screen.

Full Access
Question # 145

During a network outage, a technician discovers a new network switch that was not listed in the support documentation. The switch was installed during a recent change window when a new office was added to the environment. Which of the following would most likely prevent this type of mismatch after next month's change window?

A.

Performing annual network topology reviews

B.

Requiring all network changes include updating the network diagrams

C.

Allowing network changes once per year

D.

Routinely backing up switch configuration files

Full Access
Question # 146

A corporation purchased new computers for a school. The computers are the same make and model and need to have the standard image loaded. Which of the following orchestration tools should a desktop administrator use tor wide-scale deployment?

A.

USB drive

B.

DVD Installation media

C.

PXE boot

D.

Recovery partition

Full Access
Question # 147

A user called the help desk lo report an Issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop?

A.

nslookup

B.

net use

C.

netstat

D.

net user

Full Access
Question # 148

A user is unable to access a web-based application. A technician verifies the computer cannot access any web pages at all. The computer obtains an IP address from the DHCP server. Then, the technician verifies the user can ping localhost. the gateway, and known IP addresses on the interne! and receive a response. Which of the following Is the MOST likely reason tor the Issue?

A.

A firewall is blocking the application.

B.

The wrong VLAN was assigned.

C.

The incorrect DNS address was assigned.

D.

The browser cache needs to be cleared

Full Access
Question # 149

Which of the following common security vulnerabilities can be mitigated by using input validation?

A.

Brute-force attack

B.

Cross-site scripting

C.

SQL injection

D.

Cross-site request forgery

Full Access
Question # 150

A technician is concerned about a large increase in the number of whaling attacks happening in the industry. The technician wants to limit the company's risk to avoid any issues. Which of the following items should the technician implement?

A.

Screened subnet

B.

Firewall

C.

Anti-phishing training

D.

Antivirus

Full Access
Question # 151

A remote user is having issues accessing an online share. Which of the following tools would MOST likely be used to troubleshoot the Issue?

A.

Screen-sharing software

B.

Secure shell

C.

Virtual private network

D.

File transfer software

Full Access
Question # 152

A large university wants to equip all classrooms with high-definition IP videoconferencing equipment. Which of the following would most likely be impacted in this situation?

A.

SAN

B.

LAN

C.

GPU

D.

PAN

Full Access
Question # 153

A user reported that a laptop's screen turns off very quickly after silting for a few moments and is also very dim when not plugged in to an outlet Everything else seems to be functioning normally. Which of the following Windows settings should be configured?

A.

Power Plans

B.

Hibernate

C.

Sleep/Suspend

D.

Screensaver

Full Access
Question # 154

A systems administrator installed the latest Windows security patch and received numerous tickets reporting slow performance the next day. Which of the following should the administrator do to resolve this issue?

A.

Rebuild user profiles.

B.

Roll back the updates.

C.

Restart the services.

D.

Perform a system file check.

Full Access
Question # 155

A technician received a call from a user who clicked on a web advertisement Now. every time the user moves the mouse, a pop-up display across the monitor. Which of the following procedures should the technician perform?

A.

Boot into safe mode.

B.

Perform a malware scan.

C.

Restart the machine.

D.

Reinstall the browser

Full Access
Question # 156

A user installed a new computer game. Upon starting the game, the user notices the frame rates are low. Which of the following should the user upgrade to resolve the issue?

A.

Hard drive

B.

Graphics card

C.

Random-access memory

D.

Monitor

Full Access
Question # 157

A company would like to implement multifactor authentication for all employees at a minimal cost. Which of the following best meets the company's requirements?

A.

Biometrics

B.

Soft token

C.

Access control lists

D.

Smart card

Full Access
Question # 158

A technician is selling up a newly built computer. Which of the following is the FASTEST way for the technician to install Windows 10?

A.

Factory reset

B.

System Restore

C.

In-place upgrade

D.

Unattended installation

Full Access
Question # 159

A change advisory board authorized a setting change so a technician is permitted to Implement the change. The technician successfully implemented the change. Which of the following should be done next?

A.

Document the date and time of change

B.

Document the purpose of the change.

C.

Document the risk level.

D.

Document the findings of the sandbox test,

Full Access
Question # 160

Users access files in the department share. When a user creates a new subfolder, only that user can access the folder and Its files. Which of the following will MOST likely allow all users to access the new folders?

A.

Assigning share permissions

B.

Enabling inheritance

C.

Requiring multifactor authentication

D.

Removing archive attribute

Full Access
Question # 161

Which of the following helps ensure that a piece of evidence extracted from a PC is admissible in a court of law?

A.

Data integrity form

B.

Valid operating system license

C.

Documentation of an incident

D.

Chain of custody

Full Access
Question # 162

Every time a user tries to open the organization's proprietary application on an Android tablet, the application immediately closes. Other applications are operating normally. Which of the following troubleshooting actions would MOST likely resolve the Issue? (Select TWO).

A.

Uninstalling the application

B.

Gaining root access to the tablet

C.

Resetting the web browser cache

D.

Deleting the application cache

E.

Clearing the application storage

F.

Disabling mobile device management

Full Access
Question # 163

A system drive is nearly full, and a technician needs lo tree up some space. Which of the following tools should the technician use?

A.

Disk Cleanup

B.

Resource Monitor

C.

Disk Defragment

D.

Disk Management

Full Access
Question # 164

A remote user is experiencing issues connecting to a corporate email account on a laptop. The user clicks the internet connection icon and does not recognize the connected Wi-Fi. The help desk technician, who is troubleshooting the issue, assumes this is a rogue access point. Which of the following is the first action the technician should take?

A.

Restart the wireless adapter.

B.

Launch the browser to see if it redirects to an unknown site.

C.

Instruct the user to disconnect the Wi-Fi.

D.

Instruct the user to run the installed antivirus software.

Full Access
Question # 165

A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS Is several versions out of date. The user Is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the Issue?

A.

The device does not have enough free space lo download the OS updates.

B.

The device needs domain administrator confirmation to update to a major release.

C.

The device is not compatible with the newest version of the OS.

D.

The device is restricted from updating due to a corporate security policy.

Full Access
Question # 166

A small-office customer needs three PCs to be configured in a network with no server. Which of the following network types is the customer's BEST choice for this environment?

A.

Workgroup network

B.

Public network

C.

Wide area network

D.

Domain network

Full Access
Question # 167

An application user received an email indicating the version of the application currently in use will no longer be sold. Users with this version of the application will no longer receive patches or updates either. Which of the following indicates a vendor no longer supports a product?

A.

AUP

B.

EULA

C.

EOL

D.

UAC

Full Access
Question # 168

A technician is installing RAM in a new workstation and needs to protect against electrostatic discharge. Which of the following will best resolve this concern?

A.

Battery backup

B.

Thermal paste

C.

ESD strap

D.

Consistent power

Full Access
Question # 169

A user reports a virus is on a PC. The user installs additional real-lime protection antivirus software, and the PC begins performing extremely slow. Which of the following steps should the technician take to resolve the issue?

A.

Uninstall one antivirus software program and install a different one.

B.

Launch Windows Update, and then download and install OS updates

C.

Activate real-time protection on both antivirus software programs

D.

Enable the quarantine feature on both antivirus software programs.

E.

Remove the user-installed antivirus software program.

Full Access
Question # 170

A technician is trying to encrypt a single folder on a PC. Which of the following should the technician use to accomplish this task?

A.

FAT32

B.

exFAT

C.

BitLocker

D.

EFS

Full Access
Question # 171

A workstation is displaying a message indicating that a user must exchange cryptocurrency for a decryption key. Which of the following is the best way for a technician to return the device to service safely?

A.

Run an AV scan.

B.

Reinstall the operating system

C.

Install a software firewall.

D.

Perform a system restore.

E.

Comply with the on-screen instructions.

Full Access
Question # 172

A technician removed a virus from a user's device. The user returned the device a week later with the same virus on it. Which of the following should the technician do to prevent future infections?

A.

Disable System Restore.

B.

Educate the end user.

C.

Install the latest OS patches.

D.

Clean the environment reinstallation.

Full Access
Question # 173

A technician is investigating options to secure a small office's wireless network. One requirement is to allow automatic log-ins to the network using certificates instead of passwords. Which of the following should the wireless solution have in order to support this feature?

A.

RADIUS

B.

AES

C.

EAP-EKE

D.

MFA

Full Access
Question # 174

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Full Access
Question # 175

A user reports a computer is running slow. Which of the following tools will help a technician identity the issued

A.

Disk Cleanup

B.

Group Policy Editor

C.

Disk Management

D.

Resource Monitor

Full Access
Question # 176

A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method

A.

Reinstalling Windows

B.

Performing a quick format

C.

Using disk-wiping software

D.

Deleting all files from command-line interface

Full Access
Question # 177

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

A.

Encryption at rest

B.

Account lockout

C.

Automatic screen lock

D.

Antivirus

Full Access
Question # 178

A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?

A.

Deploy a secondary hard drive with encryption on the appropriate workstation

B.

Configure a hardened SFTP portal for file transfers between file servers

C.

Require files to be individually password protected with unique passwords

D.

Enable BitLocker To Go with a password that meets corporate requirements

Full Access
Question # 179

A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?

A.

Run sfc / scannow on the drive as the administrator.

B.

Run clearnmgr on the drive as the administrator

C.

Run chkdsk on the drive as the administrator.

D.

Run dfrgui on the drive as the administrator.

Full Access
Question # 180

A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue?

A.

Time drift

B.

Dual in-line memory module failure

C.

Application crash

D.

Filesystem errors

Full Access
Question # 181

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?

A.

Full

B.

Differential

C.

Off-site

D.

Grandfather-father-son

Full Access
Question # 182

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

A.

Degaussing

B.

Low-level formatting

C.

Recycling

D.

Shredding

Full Access
Question # 183

A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi When the smartphone is connected to Wi-Fi the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?

A.

The smartphone's line was not provisioned with a data plan

B.

The smartphone's SIM card has failed

C.

The smartphone's Bluetooth radio is disabled.

D.

The smartphone has too many applications open

Full Access
Question # 184

Which of the following OS types provides a lightweight option for workstations thai need an easy-to-use browser-based interface?

A.

FreeBSD

B.

Chrome OS

C.

macOS

D.

Windows

Full Access
Question # 185

A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?

A.

Operating system updates

B.

Remote wipe

C.

Antivirus

D.

Firewall

Full Access
Question # 186

When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?

A.

Have the user provide a callback phone number to be added to the ticket

B.

Assign the ticket to the department's power user

C.

Register the ticket with a unique user identifier

D.

Provide the user with a unique ticket number that can be referenced on subsequent calls.

Full Access
Question # 187

Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect it to the company’s wireless network. All the corporate laptops are connecting without issue. She has asked you to assist with getting the device online.

INSTRUCTIONS

Review the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 188

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Full Access
Question # 189

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?

A.

Remote wipe

B.

Anti-maIware

C.

Device encryption

D.

Failed login restrictions

Full Access
Question # 190

A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded. Which of the following tabs in Task Manager would contain the information a technician would use to identify the cause of this issue?

A.

Services

B.

Processes

C.

Performance

D.

Startup

Full Access
Question # 191

Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?

A.

Install and run Linux and the required application in a PaaS cloud environment

B.

Install and run Linux and the required application as a virtual machine installed under the Windows OS

C.

Use a swappable drive bay for the boot drive and install each OS with applications on its own drive Swap the drives as needed

D.

Set up a dual boot system by selecting the option to install Linux alongside Windows

Full Access
Question # 192

A technician is investigating an employee's smartphone that has the following symptoms

• The device is hot even when it is not in use.

•Applications crash, especially when others are launched.

• Certain applications, such as GPS, are in portrait mode when they should be in landscape mode.

Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Select TWO).

A.

Turn on autorotation

B.

Activate airplane mode.

C.

Close unnecessary applications

D.

Perform a factory reset

E.

Update the device's operating system

F.

Reinstall the applications that have crashed.

Full Access
Question # 193

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

A.

Avoid distractions

B.

Deal appropriately with customer's confidential material .

C.

Adhere to user privacy policy

D.

Set and meet timelines

Full Access
Question # 194

The command cac cor.ptia. txt was issued on a Linux terminal. Which of the following results should be expected?

A.

The contents of the text comptia.txt will be replaced with a new blank document

B.

The contents of the text comptia. txt would be displayed.

C.

The contents of the text comptia.txt would be categorized in alphabetical order.

D.

The contents of the text comptia. txt would be copied to another comptia. txt file

Full Access
Question # 195

A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?

A.

Spyware

B.

Cryptominer

C.

Ransormvare

D.

Boot sector virus

Full Access
Question # 196

A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?

A.

Encryption

B.

Wi-Fi channel

C.

Default passwords

D.

Service set identifier

Full Access
Question # 197

Which of the following Wi-Fi protocols is the MOST secure?

A.

WPA3

B.

WPA-AES

C.

WEP

D.

WPA-TKIP

Full Access
Question # 198

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90cBcc97fa7c211b767aB

Which of the following BEST describes the purpose of this string?

A.

XSS verification

B.

AES-256 verification

C.

Hash verification

D.

Digital signature verification

Full Access
Question # 199

A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?

A.

Consoltf

B.

Disk Utility

C.

Time Machine

D.

FileVault

Full Access
Question # 200

A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?

A.

Internet-based upgrade

B.

Repair installation

C.

Clean install

D.

USB repair

E.

In place upgrade

Full Access
Question # 201

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

A.

Rights management

B.

Audit trail

C.

Chain of custody

D.

Data integrity

Full Access
Question # 202

A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO).

A.

Prevent a device root

B.

Disable biometric authentication

C.

Require a PIN on the unlock screen

D.

Enable developer mode

E.

Block a third-party application installation

F.

Prevent GPS spoofing

Full Access
Question # 203

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

A.

Full

B.

Non-parity

C.

Differential

D.

Incremental

Full Access
Question # 204

A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting?

A.

Install alternate open-source software in place of the applications with issues

B.

Run both CPU and memory tests to ensure that all hardware functionality is normal

C.

Check for any installed patches and roll them back one at a time until the issue is resolved

D.

Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications.

Full Access
Question # 205

A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?

A.

Default gateway

B.

Host address

C.

Name server

D.

Subnet mask

Full Access
Question # 206

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

A.

.deb

B.

.vbs

C.

.exe

D.

.app

Full Access
Question # 207

A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred?

A.

Ransomware

B.

Failed OS updates

C.

Adware

D.

Missing system files

Full Access
Question # 208

A technician is unable to join a Windows 10 laptop to a domain Which of the following is the MOST likely reason?

A.

The domain's processor compatibility is not met

B.

The laptop has Windows 10 Home installed

C.

The laptop does not have an onboard Ethernet adapter

D.

The Laptop does not have all current Windows updates installed

Full Access
Question # 209

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?

A.

Cryptominer

B.

Phishing

C.

Ransomware

D.

Keylogger

Full Access
Question # 210

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?

A.

All updated software must be tested with alt system types and accessories

B.

Extra technician hours must be budgeted during installation of updates

C.

Network utilization will be significantly increased due to the size of CAD files

D.

Large update and installation files will overload the local hard drives.

Full Access
Question # 211

A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST security practice for this scenario?

A.

PIN-based login

B.

Quarterly password changes

C.

Hard drive encryption

D.

A physical laptop lock

Full Access
Question # 212

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application?

A.

Use a network share to share the installation files.

B.

Save software to an external hard drive to install.

C.

Create an imaging USB for each PC.

D.

Install the software from the vendor's website

Full Access
Question # 213

A user installed a new application that automatically starts each time the user logs in to a Windows 10 system. The user does not want this to happen and has asked for this setting to be changed. Which of the following tools would the technician MOST likely use to safely make this change?

A.

Registry Editor

B.

Task Manager

C.

Event Viewer

D.

Local Users and Groups

Full Access
Question # 214

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

A.

Use a key combination to lock the computer when leaving.

B.

Ensure no unauthorized personnel are in the area.

C.

Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.

D.

Turn off the monitor to prevent unauthorized visibility of information.

Full Access
Question # 215

A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user?

A.

Windows Enterprise Edition

B.

Windows Professional Edition

C.

Windows Server Standard Edition

D.

Windows Home Edition

Full Access
Question # 216

A help desk technician runs the following script: Inventory.py. The technician receives the following error message:

How do you want to Open this file?

Which of the following is the MOST likely reason this script is unable to run?

A.

Scripts are not permitted to run.

B.

The script was not built for Windows.

C.

The script requires administrator privileges,

D.

The runtime environment is not installed.

Full Access
Question # 217

A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue?

A.

Updating the operating system

B.

Changing proxy settings

C.

Reinstalling the browser

D.

Enabling port forwarding

Full Access
Question # 218

A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the Mtv1C console. Which of the following is the NEXT step the technician should take to resolve the issue?

A.

Run the antivirus scan.

B.

Add the required snap-in.

C.

Restore the system backup

D.

use the administrator console.

Full Access
Question # 219

Which of the following data is MOST likely to be regulated?

A.

Name in a Phone book

B.

Name on a medical diagnosis

C.

Name on a job application

D.

Name on a employer's website

Full Access
Question # 220

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

A.

If airplane mode is enabled

B.

If Bluetooth is disabled

C.

If NFC is enabled

D.

If WiFi is enabled

E.

If location services are disabled

Full Access
Question # 221

A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?

A.

Put on an ESD strap

B.

Disconnect the power before servicing the PC.

C.

Place the PC on a grounded workbench.

D.

Place components on an ESD mat.

Full Access
Question # 222

A user is setting up a computer for the first time and would like to create a secondary login with permissions that are different than the primary login. The secondary login will need to be protected from certain content such as games and websites. Which of the following Windows settings should the user utilize to create the secondary login?

A.

Privacy

B.

Accounts

C.

Personalization

D.

Shared resources

Full Access
Question # 223

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which

of the following will allow the mouse to correctly move to the new monitor?

A.

Rearranging the monitor's position in display settings

B.

Swapping the cables for the monitors

C.

Using the Ctrl+AIt+> to correct the display orientation

D.

Updating the display drivers for the video card

Full Access
Question # 224

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?

A.

Drilling

B.

Degaussing

C.

Low-level formatting

D.

Erasing/wiping

Full Access
Question # 225

A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?

A.

Signed system images

B.

Antivirus

C.

SSO

D.

MDM

Full Access
Question # 226

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

A.

Device Manager

B.

Indexing Options

C.

File Explorer

D.

Administrative Tools

Full Access
Question # 227

A customer recently experienced a power outage at a SOHO. The customer does not think the components are connected properly. A print job continued running for several minutes after the power failed, but the customer was not able to interact with the computer. Once the UPS stopped beeping, all functioning devices also turned off. In case of a future power failure, the customer wants to have the most time available to save cloud documents and shut down the computer without losing any data.

Full Access
Question # 228

A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script?

A.

The instructions from the software company are not being followed.

B.

Security controls will treat automated deployments as malware.

C.

The deployment script is performing unknown actions.

D.

Copying scripts off the internet is considered plagiarism.

Full Access
Question # 229

A suite of security applications was installed a few days ago on a user's home computer. The user reports that the

computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST?

A.

Services in Control Panel to check for overutilization

B.

Performance Monitor to check for resource utilization

C.

System File Checker to check for modified Windows files

D.

Event Viewer to identify errors

Full Access
Question # 230

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

A.

Differential backup

B.

Off-site backup

C.

Incremental backup

D.

Full backup

Full Access
Question # 231

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?

A.

Escalate the ticket to Tier 2.

B.

Run a virus scan.

C.

Utilize a Windows restore point.

D.

Reimage the computer.

Full Access
Question # 232

A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT?

A.

resmon_exe

B.

dfrgui_exe

C.

msinf032exe

D.

msconfig_exe

Full Access
Question # 233

Which of the following is a consequence of end-of-lite operating systems?

A.

Operating systems void the hardware warranty.

B.

Operating systems cease to function.

C.

Operating systems no longer receive updates.

D.

Operating systems are unable to migrate data to the new operating system.

Full Access
Question # 234

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on

multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

A.

Use the application only on the home laptop because it contains the initial license.

B.

Use the application at home and contact the vendor regarding a corporate license.

C.

Use the application on any computer since the user has a license.

D.

Use the application only on corporate computers.

Full Access
Question # 235

A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate laptop. Which of the following BEST describes what the technician should do before returning the laptop to the user?

A.

Educate the user on malware removal.

B.

Educate the user on how to reinstall the laptop OS.

C.

Educate the user on how to access recovery mode.

D.

Educate the user on common threats and how to avoid them.

Full Access
Question # 236

A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?

A.

Bridge the LAN connection between the laptop and the desktop.

B.

Set the laptop configuration to DHCP to prevent conflicts.

C.

Remove the static IP configuration from the desktop.

D.

Replace the network card in the laptop, as it may be defective.

Full Access
Question # 237

A user is unable to access a website, which is widely used across the organization, and receives the following error message:

The security certificate presented by this website has expired or is not yet valid.

The technician confirms the website works when accessing it from another computer but not from the user's computer. Which of the following should the technician perform NEXT to troubleshoot the issue?

A.

Reboot the computer.

B.

Reinstall the OS.

C.

Configure a static 12

D.

Check the computer's date and time.

Full Access
Question # 238

Which of the following is a data security standard for protecting credit cards?

A.

PHI

B.

NIST

C.

PCI

D.

GDPR

Full Access
Question # 239

A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?

A.

Device Manager

B.

System

C.

Ease of Access Center

D.

Programs and Features

Full Access
Question # 240

An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?

A.

RDP through RD Gateway

B.

Apple Remote Desktop

C.

SSH access with SSH keys

D.

VNC with username and password

Full Access
Question # 241

After a company installed a new SOHO router customers were unable to access the company-hosted public website. Which of the following will MOST likely allow customers to access the website?

A.

Port forwarding

B.

Firmware updates

C.

IP filtering

D.

Content filtering

Full Access
Question # 242

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).

A.

File Explorer

B.

User Account Control

C.

Windows Backup and Restore

D.

Windows Firewall

E.

Windows Defender

F.

Network Packet Analyzer

Full Access
Question # 243

A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center?

A.

Encrypt the workstation hard drives.

B.

Lock the workstations after five minutes of inactivity.

C.

Install privacy screens.

D.

Log off the users when their workstations are not in use.

Full Access
Question # 244

A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue?

A.

The user is not connected to the VPN.

B.

The file server is offline.

C.

A low battery is preventing the connection.

D.

The log-in script failed.

Full Access
Question # 245

A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?

A.

The UEFI settings need to be changed.

B.

The RAM has compatibility issues with Windows 10.

C.

Some of the RAM is defective.

D.

The newly installed OS is x86.

Full Access
Question # 246

A network administrator wants to enforce a company's security policy that prohibits USB drives on user workstations. Which of the following commands should the administrator run on the users' workstations?

A.

diskpart

B.

chown

C.

gpupdate

D.

netstat

Full Access
Question # 247

Multiple users routinely record log-in information in readily accessible areas. Which of the following is the best way to mitigate this issue?

A.

Trusted sources

B.

Valid certificates

C.

User training

D.

Password manager

Full Access
Question # 248

Which of the following operating systems was the app file type designed to run under as an application file bundle?

A.

macOS

B.

Chrome

C.

Windows

D.

Linux

Full Access
Question # 249

A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS. the malware infection returned later that day. Which of the following is the most likely source?

A.

Trojan

B.

Boot sector virus

C.

Spyware

D.

Rootkit

Full Access